Showing 1 - 12 of 46
DAR Series Part 4: NSA CSfC vs. Type 1 Encryption

DAR Series Part 4: NSA CSfC vs. Type 1 Encryption

Explore the differences and benefits of Type 1 and CSfC encryption approaches. Use this guide to make informed decisions for your program requirements.

07/03/2024
Simplifying the Challenge of Expeditionary Communications

Simplifying the Challenge of Expeditionary Communications

This white paper presents a strategic framework for addressing obstacles to efficient communications and how best to maintain seamless connectivity through the utilization of open standards-based, field-proven Curtiss-Wright hardware and software.

06/26/2024
Simplified Replacement of Older Flight Data Recorders to Meet New Regulations and Data Collecting Needs

Simplified Replacement of Older Flight Data Recorders to Meet New Regulations and Data Collecting Needs

Operators of aircraft may find they need to upgrade existing flight recorder for a variety of reasons.

05/23/2024
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.

05/22/2024
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.

05/22/2024
Defining the C5ISR Space for Army Vehicles

Optimizing Army Vehicle Interoperability with Open Architecture

The goal of reducing the cost of equipping Army vehicles with new capabilities, while adding increasing interoperability and flexibility of operation, can be accomplished through the use of a Modular Open Systems Approach (MOSA), a technical and business strategy for designing an affordable and adaptable system.

05/10/2024
Using NetBoot to Reduce Maintenance and SWaP-C in Embedded Systems

Using NetBoot to Reduce Deployed System Maintenance and SWaP-C

This white paper looks at how NetBoot brings new efficiencies, better security, and significant savings to teams that are tasked with maintaining software on embedded systems.

04/16/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
Fabric100

Fabric100 100G Processing: Why Architectures Matter

Designers of high-performance embedded computing modules and systems must understand the technical considerations required to realize the true benefits of 100G technology fully.

10/04/2023
Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Classified data-at-rest (DAR) in deployed applications faces both internal and external threats that can subject sensitive data to exploitation.

07/06/2023